We may earn an affiliate commission when you visit our partners.
Course image
Chris Bryant

Over 150,000 students in my Video Boot Camps have joined my Video Boot Camps on Udemy, and now it's your turn.

Every single video in this CCNA Security 210-260 Video Boot Camp is downloadable, and you'll get your certification with the clearest, most comprehensive CCNA Security course available  - and without busting your budget.  

Even better, your access to the CCNA Security training course is permanent, and every video is downloadable for viewing offline.

Thanks for making my course part of your CCNA Security certification success story.  

Chris Bryant CCIE #12933

Read more

Over 150,000 students in my Video Boot Camps have joined my Video Boot Camps on Udemy, and now it's your turn.

Every single video in this CCNA Security 210-260 Video Boot Camp is downloadable, and you'll get your certification with the clearest, most comprehensive CCNA Security course available  - and without busting your budget.  

Even better, your access to the CCNA Security training course is permanent, and every video is downloadable for viewing offline.

Thanks for making my course part of your CCNA Security certification success story.  

Chris Bryant CCIE #12933

"The Computer Certification Bulldog"   

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

CCNA Security 210-260, Section 1: Network Attack Fundamentals
Fund. 1: Citizen C.I.A.
Fund. 2: Intro To SIEM
Fund 3: More SIEM
Read more
Fund 4: Recon Attacks and Phishing
Fund 5: Spear Phishing, QPQ, And Pretexting
Fund 6: Privilege Escalation and Telnet
Fund 7: Privilege Escalation Continues
Fund 8: DoS and DDoS Attacks
Fund 9: Advanced Persistent Threats
CCNA Security 210-260, Section 2: Specific Attacks And Defenses
Attack 1: Man-In-The-Middle Attacks
Attack 2: ARP Poisoning and Dynamic ARP Inspection
Attack 3: DAI Commands
Attack 4: MAC Spoofing and CAM Table Overflows
Attack 5: Port Security Fundamentals
Attack 6: Port Security and Dynamic Secure Addresses
Attack 7: Port Security Shutdown!
Attack 8: Port Security And Automatic Port Reenabling
Attack 9: Port Security Static Address Aging
Attack 10: Port Security Dynamic Address Aging
Attack 11: Refresh Your VLAN Knowledge Here!
Attack 12: Private VLAN Theory
Attack 13: Private VLAN Lab
Attack 14: OSPF Authentication Fundamentals
Attack 15: OSPF Clear-Text Authentication
Attack 16: OSPF MD5 Authentication
Attack 17: Root Guard
Attack 18: BPDU Guard and Loop Guard
Attack 19: VLAN ACLs, Part 1
Attack 20: VLAN ACLs, Part 2
Attack 21: Stoppin' VLAN Hoppin'
Attack 22: DHCP Snooping Intro
Attack 23: DHCP Snooping Address Renewal
Attack 24: DHCP Snooping -- 1st Time Address Acquisition Lab
Attack 25: IPSG Theory, Lab 1 Begins
Attack 26: IPSG Lab 1 Continues
Attack 27: IPSG Static Bindings Lab
Attack 28: Segue To The Next Section
CCNA Security 210-260: Privilege Levels
Levels 1: The Fundamentals
Levels 2: The Other Defaults
Levels 3: Intro To Custom Levels
Levels 4: Custom Level Lab Continues (Interface-Level Commands)
Levels 5: The Autocommand and One-Time Password Options
Levels 6: Privilege Levels and "Show Run"
Levels 7: Role-Based CLI Begins
Levels 8: Role-Based CLI Continues
Levels 9: Superviews!
Levels 10: Applying The Views, Part 1
Levels 11: Applying The Views, Part 2
Levels 12: Intro To Lawful Intercept
Levels 13: Resilient Config Labs Begin
Levels 14: Resilient Config Labs Continue
Levels 15: Resilient Config Test
Levels 16: Resilient Image Tes
CCNA Security Course: Protecting The Control Plane
Control Plane 1: Intro To CoPP
Control Plane 2: Class Maps and CoPP
Control Plane 3: Policy Maps and CoPP
Control Plane 4: Verifying CoPP / Intro To CPPp
CCNA Security 210-260: New VPN Section
VPN 1: Site-to-Site Theory
VPN 2: ISAKMP Phases 1 and 2
VPN 3: Writing The ISAKMP Policy, Part 1
VPN 4: Writing The ISAKMP Policy, Part 2
VPN 5: Finishing The ISAKMP Policy / Adding The Keys
VPN 6: Writing The Transform Sets
VPN 6A: Defining Interesting Traffic
VPN 7: Writing The Crypto Map
VPN 8: Testing and Troubleshooting
VPN 9: Crypto Map This n' That
VPN 10: Debugging A Tunnel Build
VPN 11: Diffie-Hellman Details
VPN 12: Using ASDM To Build A VPN
VPN 13: More ASDM VPN Building
VPN 14: Wrapping Up Our 1st ADSM VPN Build
CCNA Security 210-260: Firewalls
Firewall 1: So Just What IS A Firewall?
Firewall 2: Stateless and Stateful Filtering
Firewall 3: Proxy Firewalls
Firewall 4: Personal Firewalls
Firewalls 5: The ZBF And Zone Pairs
Firewalls 6: The DMZ
Firewalls 7: IP Addressing For Firewall Labs
Firewalls 8: Basic Firewall Lab With CCP
Firewall 9: Basic Firewall Wizard Lab Concludes
Firewall 10: Advanced Firewall Wizard Lab Begins
Firewall 11: Advanced Firewall Wizard Lab Concludes
Firewall 12: Intro To ASA Firewalling
Firewall 13: Configuring A New ASA
Firewall 14: ADSM Lab Begins -- Outside Interface
Firewall 15: ADSM Lab Continues
Firewall 16: ADSM Lab Continues (Access Rule Application)
Firewall 17: ADSM Lab Continues (Global Rule Permit IP Any Any?)
Firewall 18: ADSM Lab Concludes
Firewall 19: Same Security Levels... And "Phone Home"
CCNA Security 210-260: The IPS and IDS
IPS 1: The Differences
IPS 2: Where They Can Go and What They Can DO

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Explores concepts that are essential to meet compliance requirements
Examines attacks on network fundamentals, like Reconnaissance Attacks and Phishing
Teaches how to secure the network control plane through the use of CoPP, CPPp, and other security measures
Develops foundational network attack fundamentals
Provides comprehensive coverage of firewalls, which are essential for network security
Emphasizes practical application through real-world scenarios and hands-on labs

Save this course

Save CCNA Security 2019 210-260 Video Boot Camp With Chris Bryant to your list so you can find it easily later:
Save

Reviews summary

Informative and engaging video course

Learners say this informative and engaging video series is a great primary resource for preparing for the CCNA Security certification. While students really appreciated the content, many were frustrated by an unnecessary 10-minute video rule that caused extra summaries and fluff within the lectures.
Great primary resource for preparing for the certification.
"I would utilize this as a primary source since it was the most complete course that I found."
While informative and engaging, this series by itself is not enough for certification.
"This is a great video series. However, it by itself is not enough to achieve the CCNA Security certification."
Course contains lots of unnecessary fluff due to a 10-minute video length restriction.
"I do have an issue with the 10 minute video rule. Where did this rule come from?"
"At the beginning and end of each 10 minutes there is a summary that is completely unnecessary."
"1 video per topic should be sufficient."

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in CCNA Security 2019 210-260 Video Boot Camp With Chris Bryant with these activities:
Review of 'CCNA Security Study Guide' by Todd Lammle
Strengthen your understanding of CCNA Security concepts
Show steps
  • Read the book's chapters and take notes
  • Answer the end-of-chapter questions
  • Complete the practice exams included in the book
Review OSI Model Basics
Start by refreshing your knowledge of the OSI model to deepen your understanding of networking concepts
Browse courses on OSI Model
Show steps
  • Draw the OSI model from memory and label each layer
  • Identify the key functions of each layer
  • Provide examples of protocols that operate at each layer
Configure Dynamic Host Configuration Protocol
Gain practical experience in configuring DHCP
Browse courses on DHCP
Show steps
  • Find online tutorials or documentation on DHCP configuration
  • Set up a lab environment to practice DHCP configuration
  • Configure DHCP on a router or DHCP server
  • Verify that DHCP is functioning properly
Nine other activities
Expand to see all activities and additional details
Show all 12 activities
Virtual Study Group for Practice Questions
Collaborate with your fellow students to deepen your understanding
Browse courses on CCNA Security
Show steps
  • Organize a regular meet-up with other students in your class
  • Prepare practice questions and scenarios to discuss
  • Share your knowledge and learn from others in the group
Compile a Glossary of Key Concepts
Enhance your understanding of key concepts by compiling a glossary of terms related to CCNA Security.
Show steps
  • Identify key terms and concepts throughout the course content.
  • Define each term clearly and concisely.
  • Organize the terms alphabetically or by category.
  • Review the glossary regularly to reinforce your understanding.
Set Up a Basic Firewall with CCP
Reinforce your understanding of firewall configurations by setting up a basic firewall with CCP.
Browse courses on Firewalls
Show steps
  • Review the provided lab instructions.
  • Configure the basic firewall settings.
  • Test the firewall to ensure it's working properly.
Configure a VPN Using ASDM
Gain practical experience by configuring a VPN using the ASDM interface.
Browse courses on VPN Configuration
Show steps
  • Gather the necessary network requirements and configuration details.
  • Design the VPN architecture and topology.
  • Implement the VPN configuration using the ASDM interface.
  • Test and verify the VPN functionality end-to-end.
Attend a CCNA Security Workshop
Supplement your learning by attending a CCNA Security workshop led by industry experts.
Show steps
  • Research and identify relevant CCNA Security workshops.
  • Register and attend the workshop.
  • Actively participate in discussions and hands-on exercises.
Explore Advanced ASA Firewalling Techniques
Expand your skills by exploring advanced ASA firewalling techniques through online tutorials.
Show steps
  • Identify reliable and reputable tutorial sources.
  • Follow the tutorials step-by-step to implement advanced firewall configurations.
  • Test your configurations and troubleshoot any issues that arise.
Phishing Attack Report
Analyze and document phishing attacks to enhance your understanding of their techniques
Show steps
  • Gather data on phishing attacks through research
  • Identify the common methods and techniques used in phishing attacks
  • Develop countermeasures to mitigate the risks of phishing attacks
  • Write a detailed report on your findings and recommendations
Participate in Capture the Flag (CTF) Competitions
Test your security skills and knowledge in a gamified environment
Show steps
  • Find and register for CTF competitions that align with your skill level
  • Form a team or compete individually
  • Solve security challenges and capture flags
  • Analyze your performance and identify areas for improvement
Contribute to Open Source Security Projects
Gain hands-on experience in security by contributing to open source projects
Browse courses on Open Source Security
Show steps
  • Identify open source security projects that align with your interests
  • Review the project's documentation and codebase
  • Find areas where you can contribute your skills
  • Submit your code changes and documentation updates

Career center

Learners who complete CCNA Security 2019 210-260 Video Boot Camp With Chris Bryant will develop knowledge and skills that may be useful to these careers:
Network Security Analyst
A Network Security Analyst is tasked with protecting the security of a computer network by identifying vulnerabilities and implementing the necessary security measures. The CCNA Security 210-260 Video Boot Camp With Chris Bryant covers various topics related to network security including: network attack fundamentals, specific attacks and defenses, privilege levels, protecting the control plane, firewalls, and the IPS and IDS. This course may be useful for someone who wants to pursue a career as a Network Security Analyst.
Security Architect
A Security Architect designs, implements, and maintains the security of an organization's computer systems and networks. The CCNA Security 210-260 Video Boot Camp With Chris Bryant covers various topics related to network security including: network attack fundamentals, specific attacks and defenses, privilege levels, protecting the control plane, firewalls, and the IPS and IDS. This course may be useful for someone who wants to pursue a career as a Security Architect.
Information Security Analyst
An Information Security Analyst is responsible for protecting the security of an organization's computer systems and networks. The CCNA Security 210-260 Video Boot Camp With Chris Bryant covers various topics related to network security including: network attack fundamentals, specific attacks and defenses, privilege levels, protecting the control plane, firewalls, and the IPS and IDS. This course may be useful for someone who wants to pursue a career as an Information Security Analyst.
Network Security Engineer
A Network Security Engineer designs, implements, and maintains the security of an organization's computer networks. The CCNA Security 210-260 Video Boot Camp With Chris Bryant covers various topics related to network security including: network attack fundamentals, specific attacks and defenses, privilege levels, protecting the control plane, firewalls, and the IPS and IDS. This course may be useful for someone who wants to pursue a career as a Network Security Engineer.
Security Consultant
A Security Consultant provides advice and guidance to organizations on how to improve their security posture. The CCNA Security 210-260 Video Boot Camp With Chris Bryant covers various topics related to network security including: network attack fundamentals, specific attacks and defenses, privilege levels, protecting the control plane, firewalls, and the IPS and IDS. This course may be useful for someone who wants to pursue a career as a Security Consultant.
Security Manager
A Security Manager is responsible for overseeing the security of an organization's computer systems and networks. The CCNA Security 210-260 Video Boot Camp With Chris Bryant covers various topics related to network security including: network attack fundamentals, specific attacks and defenses, privilege levels, protecting the control plane, firewalls, and the IPS and IDS. This course may be useful for someone who wants to pursue a career as a Security Manager.
IT Security Specialist
An IT Security Specialist is responsible for implementing and maintaining the security of an organization's computer systems and networks. The CCNA Security 210-260 Video Boot Camp With Chris Bryant covers various topics related to network security including: network attack fundamentals, specific attacks and defenses, privilege levels, protecting the control plane, firewalls, and the IPS and IDS. This course may be useful for someone who wants to pursue a career as an IT Security Specialist.
Cybersecurity Analyst
A Cybersecurity Analyst is responsible for identifying and mitigating cybersecurity threats. The CCNA Security 210-260 Video Boot Camp With Chris Bryant covers various topics related to network security including: network attack fundamentals, specific attacks and defenses, privilege levels, protecting the control plane, firewalls, and the IPS and IDS. This course may be useful for someone who wants to pursue a career as a Cybersecurity Analyst.
Penetration Tester
A Penetration Tester is responsible for testing the security of an organization's computer systems and networks. The CCNA Security 210-260 Video Boot Camp With Chris Bryant covers various topics related to network security including: network attack fundamentals, specific attacks and defenses, privilege levels, protecting the control plane, firewalls, and the IPS and IDS. This course may be useful for someone who wants to pursue a career as a Penetration Tester.
Incident Responder
An Incident Responder is responsible for responding to and mitigating security incidents. The CCNA Security 210-260 Video Boot Camp With Chris Bryant covers various topics related to network security including: network attack fundamentals, specific attacks and defenses, privilege levels, protecting the control plane, firewalls, and the IPS and IDS. This course may be useful for someone who wants to pursue a career as an Incident Responder.
Security Operations Analyst
A Security Operations Analyst is responsible for monitoring and analyzing security events to identify and mitigate threats. The CCNA Security 210-260 Video Boot Camp With Chris Bryant covers various topics related to network security including: network attack fundamentals, specific attacks and defenses, privilege levels, protecting the control plane, firewalls, and the IPS and IDS. This course may be useful for someone who wants to pursue a career as a Security Operations Analyst.
Network Administrator
A Network Administrator is responsible for managing and maintaining an organization's computer networks. The CCNA Security 210-260 Video Boot Camp With Chris Bryant covers various topics related to network security including: network attack fundamentals, specific attacks and defenses, privilege levels, protecting the control plane, firewalls, and the IPS and IDS. This course may be useful for someone who wants to pursue a career as a Network Administrator.
Systems Administrator
A Systems Administrator is responsible for managing and maintaining an organization's computer systems. The CCNA Security 210-260 Video Boot Camp With Chris Bryant covers various topics related to network security including: network attack fundamentals, specific attacks and defenses, privilege levels, protecting the control plane, firewalls, and the IPS and IDS. This course may be useful for someone who wants to pursue a career as a Systems Administrator.
IT Manager
An IT Manager is responsible for managing and overseeing an organization's IT department. The CCNA Security 210-260 Video Boot Camp With Chris Bryant covers various topics related to network security including: network attack fundamentals, specific attacks and defenses, privilege levels, protecting the control plane, firewalls, and the IPS and IDS. This course may be useful for someone who wants to pursue a career as an IT Manager.
Computer Security Analyst
A Computer Security Analyst is responsible for protecting an organization's computer systems and networks from security threats. The CCNA Security 210-260 Video Boot Camp With Chris Bryant covers various topics related to network security including: network attack fundamentals, specific attacks and defenses, privilege levels, protecting the control plane, firewalls, and the IPS and IDS. This course may be useful for someone who wants to pursue a career as a Computer Security Analyst.

Reading list

We've selected 11 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in CCNA Security 2019 210-260 Video Boot Camp With Chris Bryant.
Comprehensive study guide that covers all the topics necessary to pass the CCNA Security 210-260 exam. It includes in-depth explanations of the concepts and technologies involved, as well as practice questions and quizzes.
Provides a comprehensive overview of the principles and practices of network security. It covers a wide range of topics, including cryptography, firewalls, intrusion detection systems, and security protocols.
Hands-on guide to network security that provides real-world examples and hands-on labs. It covers a wide range of topics, including network security assessment, ethical hacking, and network defense.
Practical guide to intrusion detection and prevention. It provides a comprehensive overview of the principles and practices of intrusion detection, as well as advice on how to deploy and manage an effective intrusion detection system.
Beginner's guide to web application security. It covers a wide range of topics, including web application vulnerabilities, attack techniques, and defense mechanisms.
Comprehensive guide to cloud security. It covers a wide range of topics, including cloud security architecture, cloud security best practices, and cloud security compliance.
Classic guide to network security. It provides a comprehensive overview of the principles and practices of network security, as well as advice on how to defend against attacks.
Fascinating look at the human element of security. It provides insights into how attackers use social engineering techniques to compromise systems and networks.
True story about a computer security incident that occurred in the early days of the internet. It provides a fascinating look at the challenges of computer security and the importance of being vigilant.
Controversial look at government surveillance programs. It provides insights into the inner workings of the NSA and the ethical implications of mass surveillance.
Comprehensive guide to cyber security. It covers a wide range of topics, including cyber security threats, cyber security risks, and cyber security controls.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to CCNA Security 2019 210-260 Video Boot Camp With Chris Bryant.
CCNA 2020 200-125 Video Boot Camp With Chris Bryant
Most relevant
Chris Bryant's CCNA Practice Exam Pack #2 (ICND2 Topics)
Most relevant
CCNP All-in-1 Video Boot Camp With Chris Bryant
Most relevant
CCNP SWITCH 300-115 Video Boot Camp With Chris Bryant
Most relevant
CCNA 200-301 & Network+Practice Pack: Subnetting Success!
Cisco CCNA & NEW CCENT / ICND1 (100-105) Labs & More!
CCNP ROUTE 2018 Free Video Boot Camp: BGP Success
Cisco CCNA 200-301 – The Complete Guide to Getting...
Cisco NEW CCNA R/S (200-125): The Complete Course
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser